This class was created by Brainscape user Artur Varvashin. Visit their profile to learn more about the creator.

Decks in this class (29)

General Concepts
Acronym list,
Hardware and software list,
Osi open systems interconnection ...
24  cards
1.1 Compare and contrast various types of security controls
Security control categories,
Security control types
2  cards
1.2 Summarize fundamental security concepts.
Cia triad,
Availability,
Non repudiation
9  cards
1.3 Explain the importance of change management processes and the impact to security
Change management processes,
Technical implications of changes
2  cards
1.4 Explain the importance of using appropriate cryptographic solutions.
Symmetric vs asymmetric encryption,
Common hashing algorithms,
Increasing hash security
8  cards
2.1 Compare and contrast common threat actors and motivations
Advanced persistent threat apt
1  cards
2.2 Explain common threat vectors and attack surfaces
Test,
Threat vectors and attack surfaces,
Impersonation in social engineering
8  cards
2.3 Explain various types of vulnerabilities.
Types of cryptographic attacks,
Bluetooth vulnerabilities and att...,
Mobile vulnerabilities and attacks
7  cards
2.4 Given a scenario, analyze indicators of malicious activity
Access badge cloning,
Types of malware attacks,
Viruses
15  cards
2.5 Explain the purpose of mitigation techniques used to secure the enterprise.
Trusted operating systems tos,
Updates and patches,
Selinux
3  cards
3.1 Compare and contrast security implications of different architecture models
Virtualization and containerization,
Infrastructure as code iac,
Ics and scada
4  cards
3.2 Given a scenario, apply security principles to secure enterprise infrastructure
Firewalls,
Ids and ips,
Network appliances
8  cards
3.3 Compare and contrast concepts and strategies to protect data
Data classifications,
Data states,
Data types
3  cards
3.4 Explain the importance of resilience and recovery in security architecture
High availability,
Capacity planning,
Powering data centers
7  cards
4.1 Given a scenario, apply common security techniques to computing resources
Mobile asset deployments,
Secure baselines,
Wireless security settings
4  cards
4.2 Explain the security implications of proper hardware, software, and data asset management
Data ownership,
Mobile device management mdm,
Asset disposal and decommissioning
3  cards
4.3 Explain various activities associated with vulnerability management
Identifying vulnerabilities,
Threat intelligence feeds,
Responsible disclosure programs
6  cards
4.4 Explain security alerting and monitoring concepts and tools
Data loss prevention dlp,
Monitoring resources,
Alerting and monitoring activities
8  cards
4.5 Given a scenario, modify enterprise capabilities to enhance security
Ports and protocols critical,
Network access control nac,
Web and dns filtering
6  cards
4.6 Given a scenario, implement and maintain identity and access management
Identity and access management iam,
Sso protocols,
Federation
5  cards
4.7 Explain the importance of automation and orchestration related to secure operations
Automation and orchestration,
When to automate and orchestrate,
Benefits of automation and orches...
4  cards
4.8 Explain appropriate incident response activities
Incident response process,
Threat hunting,
Incident response training and te...
6  cards
4.9 Given a scenario, use data sources to support an investigation
Investigative data
1  cards
5.1 Summarize elements of effective security governance
Policies standards and procedures,
Governance structures,
Policies
6  cards
5.2 Explain elements of the risk management process
Quantitative risk analysis key co...,
Risk acceptance methods
2  cards
5.3 Explain the processes associated with third-party risk assessment and management
Contracts and agreements
1  cards
5.4 Summarize elements of effective security compliance
Compliance,
Non compliance consequences
2  cards
5.5 Explain types and purposes of audits and assessments
Internal audits and assessments,
Penetration testing,
Reconnaissance in pentesting
4  cards
5.6 Given a scenario, implement security awareness practices
Motivational triggers in social e...
1  cards

More about
Security+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Artur Varvashin's Security+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Make Flashcards